Analysis
-
max time kernel
26s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 18:48
Static task
static1
Behavioral task
behavioral1
Sample
e9938f2d916c0fddd8230ac0241c4c42cf55ed5eb58e4b4ab6fb161000817559.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e9938f2d916c0fddd8230ac0241c4c42cf55ed5eb58e4b4ab6fb161000817559.exe
Resource
win10v2004-20231215-en
General
-
Target
e9938f2d916c0fddd8230ac0241c4c42cf55ed5eb58e4b4ab6fb161000817559.exe
-
Size
312KB
-
MD5
f9cd86ed372b9fda0ca24ed082b4a742
-
SHA1
b9a7bc7e10d3a6272acb3646fb31f5f2672e54f0
-
SHA256
e9938f2d916c0fddd8230ac0241c4c42cf55ed5eb58e4b4ab6fb161000817559
-
SHA512
2ef77bf6bfacd8f31c587a4fad9da8e9067abe0dc670764cad020e8bfea68a17ea4483a6878a2a40c195f6c2ab93faa46cf9947440a47ccaeb774db5f823c5dd
-
SSDEEP
3072:fjMaOxcaTL6oaxJ2Hhom98iQ0txmYej1/PXzVHDVN/c5/yiT9laARTYFkc:fqxnLlav2BFKytLk1XXzVjVEDT0Fk
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
pid Process 1144 Process not Found -
Executes dropped EXE 1 IoCs
pid Process 2804 7CBE.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7CBE.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2804 7CBE.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e9938f2d916c0fddd8230ac0241c4c42cf55ed5eb58e4b4ab6fb161000817559.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e9938f2d916c0fddd8230ac0241c4c42cf55ed5eb58e4b4ab6fb161000817559.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI e9938f2d916c0fddd8230ac0241c4c42cf55ed5eb58e4b4ab6fb161000817559.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7CBE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7CBE.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2948 schtasks.exe -
Runs regedit.exe 1 IoCs
pid Process 2968 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2140 e9938f2d916c0fddd8230ac0241c4c42cf55ed5eb58e4b4ab6fb161000817559.exe 2140 e9938f2d916c0fddd8230ac0241c4c42cf55ed5eb58e4b4ab6fb161000817559.exe 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found 1144 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2140 e9938f2d916c0fddd8230ac0241c4c42cf55ed5eb58e4b4ab6fb161000817559.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 2804 7CBE.exe Token: SeRestorePrivilege 2804 7CBE.exe Token: SeBackupPrivilege 2804 7CBE.exe Token: SeLoadDriverPrivilege 2804 7CBE.exe Token: SeCreatePagefilePrivilege 2804 7CBE.exe Token: SeShutdownPrivilege 2804 7CBE.exe Token: SeTakeOwnershipPrivilege 2804 7CBE.exe Token: SeChangeNotifyPrivilege 2804 7CBE.exe Token: SeCreateTokenPrivilege 2804 7CBE.exe Token: SeMachineAccountPrivilege 2804 7CBE.exe Token: SeSecurityPrivilege 2804 7CBE.exe Token: SeAssignPrimaryTokenPrivilege 2804 7CBE.exe Token: SeCreateGlobalPrivilege 2804 7CBE.exe Token: 33 2804 7CBE.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1144 wrote to memory of 2804 1144 Process not Found 28 PID 1144 wrote to memory of 2804 1144 Process not Found 28 PID 1144 wrote to memory of 2804 1144 Process not Found 28 PID 1144 wrote to memory of 2804 1144 Process not Found 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9938f2d916c0fddd8230ac0241c4c42cf55ed5eb58e4b4ab6fb161000817559.exe"C:\Users\Admin\AppData\Local\Temp\e9938f2d916c0fddd8230ac0241c4c42cf55ed5eb58e4b4ab6fb161000817559.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2140
-
C:\Users\Admin\AppData\Local\Temp\7CBE.exeC:\Users\Admin\AppData\Local\Temp\7CBE.exe1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2804 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\k759ciu9kmg_1.exe/suac3⤵PID:2204
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\SysWOW64\regedit.exe"4⤵
- Runs regedit.exe
PID:2968
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /SC ONLOGON /TN "Windows Update Check - 0x1BB70478" /TR "C:\PROGRA~3\JAVAUP~1\K759CI~1.EXE" /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:2948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\823B.exeC:\Users\Admin\AppData\Local\Temp\823B.exe1⤵PID:2980